Enhancing security of SIC algorithm on non-orthogonal multiple access (NOMA) based systems
Tài liệu tham khảo
Mac Donald, 1979, Advanced mobile phone service: The cellular concept, Bell Labs Tech. J., 58, 15, 10.1002/j.1538-7305.1979.tb02209.x
Cox, 2012
Schneider, 2015, Towards 5G security, 1165
Dahlman, 2014, 5g radio access, Ericsson Rev., 6, 2
N. Alliance, 5G white paper, Next generation mobile networks, white paper.
Park, 2014, 5G vision and requirements of 5G forum, korea
Saito, 2013, Non-orthogonal multiple access (noma) for cellular future radio access, 1
Viterbi, 1990, Very low rate convolution codes for maximum theoretical performance of spread-spectrum multiple-access channels, IEEE J. Sel. Areas Commun., 8, 641, 10.1109/49.54460
Massey, 1988, An introduction to contemporary cryptology, Proc. IEEE, 76, 533, 10.1109/5.4440
Mukherjee, 2014, Principles of physical layer security in multiuser wireless networks: a survey, IEEE Commun. Surv. Tutor., 16, 1550, 10.1109/SURV.2014.012314.00178
Shiu, 2011, Physical layer security in wireless networks: a tutorial, IEEE Wirel. Commun., 18, 66, 10.1109/MWC.2011.5751298
Qin, 2016, Physical layer security for 5g non-orthogonal multiple access in large-scale networks, 1
Ding, 2017, On the spectral efficiency and security enhancements of noma assisted multicast-unicast streaming, IEEE Trans. Commun., 65, 3151, 10.1109/TCOMM.2017.2696527
Barros, 2006, Secrecy capacity of wireless channels, 356
Zhang, 2016, Secrecy sum rate maximization in non-orthogonal multiple access, IEEE Commun. Lett., 20, 930, 10.1109/LCOMM.2016.2539162
Chen, 2018, Physical layer security for cooperative noma systems, IEEE Trans. Veh. Technol.
Xiao, 2018, Opportunistic multicast noma with security concerns in a 5g massive mimo system, IEEE Commun. Mag., 56, 91, 10.1109/MCOM.2018.1700671
Satrya, 2017, Security enhancement to successive interference cancellation algorithm for non-orthogonal multiple access (noma), 1
He, 2017, On the design of secure non-orthogonal multiple access systems, IEEE J. Sel. Areas Commun., 35, 2196, 10.1109/JSAC.2017.2725698
Zheng, 2018, Secure noma based two-way relay networks using artificial noise and full duplex, IEEE J. Sel. Areas Commun., 10.1109/JSAC.2018.2824624
Liu, 2017, Enhancing the physical layer security of non-orthogonal multiple access in large-scale networks, IEEE Trans. Wirel. Commun., 16, 1656, 10.1109/TWC.2017.2650987
Wyner, 1975, The wire-tap channel, The Bell Syst. Tech. J., 54, 1355, 10.1002/j.1538-7305.1975.tb02040.x
Xu, 2018, Security-aware resource allocation with delay constraint for noma-based cognitive radio network, IEEE Trans. Inf. Forensics Secur., 13, 366, 10.1109/TIFS.2017.2750106
Froom, 2010
Byun, 2006, Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol, IEEE Commun. Lett., 10, 683, 10.1109/LCOMM.2006.1714545
Nam, 2008, Security enhancement to a password-authenticated group key exchange protocol for mobile ad-hoc networks, IEEE Commun. Lett., 12, 127, 10.1109/LCOMM.2008.071384
A. Mathur, A. Wielgoszewska, User equipment and method for protection of user privacy in communication networks, uS Patent App. 15/924,587 (Oct. 4 2018).
G.R. Seidman, N. Fathi, K. ten Hagen, S. Andreatta, Method and apparatus for uniquely identifying wireless devices, uS Patent App. 15/987,746 (Sep. 20 2018).
Katz, 1996
Nosrati, 2015, Secrecy capacity enhancement in two-hop DF relaying systems in the presence of eavesdropper, 7365
Nosrati, 2015